Hello,
I use several kvm box, and no problem at all except for 1
application that have bad response time.
The VM runs Windows 2008R2 and the application is an
client-server app develop with progress software and talk to an Oracle
databasei (on another server) and
https://bugzilla.kernel.org/show_bug.cgi?id=42635
Summary: PCIe passthrough broken with AMD iommu after s2disk /
resume
Product: Virtualization
Version: unspecified
Kernel Version: 3.1
Platform: All
OS/Version: Linux
https://bugzilla.kernel.org/show_bug.cgi?id=42636
Summary: PCI passthrough does not work with AMD iommu for PCI
device
Product: Virtualization
Version: unspecified
Kernel Version: 3.1
Platform: All
OS/Version: Linux
Le Mon, Jan 23, 2012 at 09:28:37AM +0100, David Cure ecrivait :
I attach the libvirt xml of my vm.
I forget to attach ;)
David.
rds.xml
Description: XML document
signature.asc
Description: Digital signature
The last one is an RFC patch:
I think it is better to refactor the rmap things, if needed, before
other architectures than x86 starts large pages support.
Takuya
arch/ia64/kvm/kvm-ia64.c|8
arch/powerpc/kvm/book3s_64_mmu_hv.c |6 +++---
We want to eliminate direct access to the rmap array.
Signed-off-by: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp
---
arch/x86/kvm/mmu_audit.c |4 +---
1 files changed, 1 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/mmu_audit.c b/arch/x86/kvm/mmu_audit.c
index 6eabae3..e62fa4f
We can hide the implementation details and treat every level uniformly.
Signed-off-by: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp
---
arch/x86/kvm/mmu.c | 12 ++--
1 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index
We can also use this for PT_PAGE_TABLE_LEVEL to treat every level
uniformly.
Signed-off-by: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp
---
arch/x86/kvm/mmu.c |3 +--
include/linux/kvm_host.h |7 +++
virt/kvm/kvm_main.c |4 +---
3 files changed, 9 insertions(+), 5
Though we have one rmap array for every level, those for large pages,
called rmap_pde, are coupled with write_count information and constitute
lpage_info arrays.
To hide this implementation details, we are now using __gfn_to_rmap()
which includes likely(level == PT_PAGE_TABLE_LEVEL) heuristics;
https://bugzilla.kernel.org/show_bug.cgi?id=42636
Alex Williamson alex.william...@redhat.com changed:
What|Removed |Added
CC|
https://bugzilla.kernel.org/show_bug.cgi?id=42635
Alex Williamson alex.william...@redhat.com changed:
What|Removed |Added
CC|
This adds a test case for taskswitches into/out of VM86. This test case
currently fails on KVM, it passes with TCG. I'll send out KVM fixes together
with this series.
I also included a small shell script that just runs tests and prints a
PASS/FAIL message for each. I've been using this script
This adds a convenient way to run all tests without having to set up
Autotest.
Signed-off-by: Kevin Wolf kw...@redhat.com
---
run_tests.sh | 107 ++
1 files changed, 107 insertions(+), 0 deletions(-)
create mode 100755 run_tests.sh
diff
Signed-off-by: Kevin Wolf kw...@redhat.com
---
x86/unittests.cfg | 12
1 files changed, 12 insertions(+), 0 deletions(-)
diff --git a/x86/unittests.cfg b/x86/unittests.cfg
index 065020a..dac7d44 100644
--- a/x86/unittests.cfg
+++ b/x86/unittests.cfg
@@ -64,6 +64,18 @@ file =
Commit 1d946e07 removed idt, but left a reference to idt in i386-only
code.
Signed-off-by: Kevin Wolf kw...@redhat.com
---
lib/x86/desc.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/lib/x86/desc.c b/lib/x86/desc.c
index c268955..770c250 100644
--- a/lib/x86/desc.c
This adds a test case that jumps into VM86 by iret-ing to a TSS and back
to Protected Mode using a task gate in the IDT.
Signed-off-by: Kevin Wolf kw...@redhat.com
---
config-i386.mak |3 +-
lib/x86/desc.c| 37 +-
lib/x86/desc.h| 36
Currently, all task switches check privileges against the DPL of the
TSS. This is only correct for jmp/call to a TSS. If a task gate is used,
the DPL of this take gate is used for the check instead. Exceptions,
external interrupts and iret shouldn't perform any check.
This patch fixes the problem
Setting the segment DPL to 0 for at least the VM86 code segment makes
the VM entry fail on VMX.
Signed-off-by: Kevin Wolf kw...@redhat.com
---
arch/x86/kvm/emulate.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index
Task switches can switch between Protected Mode and VM86. The current
mode must be updated during the task switch emulation so that the new
segment selectors are interpreted correctly and privilege checks
succeed.
Signed-off-by: Kevin Wolf kw...@redhat.com
---
arch/x86/include/asm/kvm_emulate.h
On Mon, Jan 23, 2012 at 05:07:13PM +0100, Kevin Wolf wrote:
This adds a test case that jumps into VM86 by iret-ing to a TSS and back
to Protected Mode using a task gate in the IDT.
Can you add the test case to taskswitch2.c?
Signed-off-by: Kevin Wolf kw...@redhat.com
---
config-i386.mak
Hi all,
I get continuous reboots on my guest system, including these dmesg entries:
[ 31.770538] device tap0 entered promiscuous mode
[ 31.770554] br0: port 2(tap0) entering learning state
[ 39.259921] kvm: 1517: cpu0 unhandled wrmsr: 0x0 data 400080532d74
[ 39.259936] kvm: 1517:
Am 23.01.2012 17:10, schrieb Gleb Natapov:
On Mon, Jan 23, 2012 at 05:07:13PM +0100, Kevin Wolf wrote:
This adds a test case that jumps into VM86 by iret-ing to a TSS and back
to Protected Mode using a task gate in the IDT.
Can you add the test case to taskswitch2.c?
That's actually what I
https://bugzilla.kernel.org/show_bug.cgi?id=42635
--- Comment #2 from Klaus Mueller kmuel...@justmail.de 2012-01-23 16:18:33
---
The device never works in the guest after s2disk/resume cycle of the host. But
it always works if it's used by the host itself - even after a s2disk/resume
cycle.
On Mon, Jan 23, 2012 at 05:20:22PM +0100, Kevin Wolf wrote:
Am 23.01.2012 17:10, schrieb Gleb Natapov:
On Mon, Jan 23, 2012 at 05:07:13PM +0100, Kevin Wolf wrote:
This adds a test case that jumps into VM86 by iret-ing to a TSS and back
to Protected Mode using a task gate in the IDT.
Can
https://bugzilla.kernel.org/show_bug.cgi?id=42636
--- Comment #2 from Klaus Mueller kmuel...@justmail.de 2012-01-23 16:26:49
---
Well, I did exactly what you proposed, but I got the same error again, as I
tried to apply both devices. That's the relevant part of the xml file:
hostdev
Am 23.01.2012 17:22, schrieb Gleb Natapov:
On Mon, Jan 23, 2012 at 05:20:22PM +0100, Kevin Wolf wrote:
Am 23.01.2012 17:10, schrieb Gleb Natapov:
On Mon, Jan 23, 2012 at 05:07:13PM +0100, Kevin Wolf wrote:
This adds a test case that jumps into VM86 by iret-ing to a TSS and back
to Protected
On Mon, Jan 23, 2012 at 05:32:59PM +0100, Kevin Wolf wrote:
Am 23.01.2012 17:22, schrieb Gleb Natapov:
On Mon, Jan 23, 2012 at 05:20:22PM +0100, Kevin Wolf wrote:
Am 23.01.2012 17:10, schrieb Gleb Natapov:
On Mon, Jan 23, 2012 at 05:07:13PM +0100, Kevin Wolf wrote:
This adds a test case
This series includes the core framework for the VFIO driver.
VFIO is a userspace driver interface meant to replace both the
KVM device assignment code as well as interfaces like UIO. Please
see patch 1/5 for a complete description of VFIO, what it can do,
and how it's designed.
This series can
Including rationale for design, example usage and API description.
Signed-off-by: Alex Williamson alex.william...@redhat.com
---
Documentation/vfio.txt | 359
1 files changed, 359 insertions(+), 0 deletions(-)
create mode 100644
This defines both the user and bus driver APIs.
Signed-off-by: Alex Williamson alex.william...@redhat.com
---
Documentation/ioctl/ioctl-number.txt |1
include/linux/vfio.h | 395 ++
2 files changed, 396 insertions(+), 0 deletions(-)
create
This provides the base group management with conduits to the
IOMMU driver and VFIO bus drivers.
Signed-off-by: Alex Williamson alex.william...@redhat.com
---
drivers/vfio/vfio_main.c| 1248 +++
drivers/vfio/vfio_private.h | 36 +
2 files changed,
Backing for operations on the IOMMU object, including DMA
mapping and unmapping.
Signed-off-by: Alex Williamson alex.william...@redhat.com
---
drivers/vfio/vfio_iommu.c | 611 +
1 files changed, 611 insertions(+), 0 deletions(-)
create mode 100644
Enable the base code.
Signed-off-by: Alex Williamson alex.william...@redhat.com
---
MAINTAINERS |8
drivers/Kconfig |2 ++
drivers/Makefile |1 +
drivers/vfio/Kconfig |8
drivers/vfio/Makefile |3 +++
5 files changed, 22 insertions(+),
Please send in any agenda items you are interested in covering.
Cheers,
Markus
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
On 01/20/2012 11:26 AM, Marcelo Tosatti wrote:
The following changes since commit 8c4ec5c0269bda18bb777a64b2008088d1c632dc:
pxa2xx_keypad: fix unbalanced parenthesis. (2012-01-17 02:14:42 +0100)
are available in the git repository at:
git://git.kernel.org/pub/scm/virt/kvm/qemu-kvm.git
On Thu, Jan 19, 2012 at 10:22:41PM -0500, Christoffer Dall wrote:
The kvm_vcpu_kick function performs roughly the same funcitonality on
most all architectures, so we shouldn't have separate copies.
PowerPC keeps a pointer to interchanging waitqueues on the vcpu_arch
structure and to
On Mon, Jan 23, 2012 at 07:42:04PM +0900, Takuya Yoshikawa wrote:
The last one is an RFC patch:
I think it is better to refactor the rmap things, if needed, before
other architectures than x86 starts large pages support.
Takuya
Looks good to me.
--
To unsubscribe from this list:
On Mon, Jan 23, 2012 at 05:12:07PM +0100, erik.r...@rdsoftware.de wrote:
Hi all,
I get continuous reboots on my guest system, including these dmesg entries:
[ 31.770538] device tap0 entered promiscuous mode
[ 31.770554] br0: port 2(tap0) entering learning state
[ 39.259921] kvm:
Marcelo Tosatti wrote:
On Mon, Jan 23, 2012 at 05:12:07PM +0100, erik.r...@rdsoftware.de wrote:
Hi all,
I get continuous reboots on my guest system, including these dmesg entries:
[ 31.770538] device tap0 entered promiscuous mode
[ 31.770554] br0: port 2(tap0) entering learning state
[
None of those files have any meaning for today's qemu-kvm.
Signed-off-by: Jan Kiszka jan.kis...@siemens.com
---
Note that I removed the binary patch to delete pc-bios/openbios-sparc.
It seemms to have caused troubles getting this on the list.
pc-bios/bios-vista.diff | 17 -
subscribe kvm
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
On 01/19/2012 12:04 PM, Jan Kiszka wrote:
On 2012-01-19 18:54, Marcelo Tosatti wrote:
On Thu, Jan 19, 2012 at 01:39:24PM +0100, Jan Kiszka wrote:
This is at best a PPC topi but according to [1] even there unneeded. In
any case, remove this diff to upstream, it should be handled there if
Hello All,
Non-development question, apologies if I am posting to the wrong list,
but I cannot seem to find linux kvm forum 2010 videos at the following
link:
http://www.linux-kvm.org/page/KVM_Forum_2010
Is there some place else where they might be present ?
Nick
--
To unsubscribe from this
Hi, I think I've tracked down the bug that causes
KVM_GET_SUPPORTED_CPUID failed: Argument list too long errors when
using the kvm tool. Basically, this (possibly squished) code seems to
be to blame:
case 0xd: {
int i;
entry-flags |= KVM_CPUID_FLAG_SIGNIFCANT_INDEX;
for (i = 1; *nent maxnent i
Sorry, forgot to add a subject.
Gabe
On Mon, Jan 23, 2012 at 9:18 PM, Gabe Black gabebl...@google.com wrote:
Hi, I think I've tracked down the bug that causes
KVM_GET_SUPPORTED_CPUID failed: Argument list too long errors when
using the kvm tool. Basically, this (possibly squished) code seems
The GET_SUPPORTED_CPUID bug has been fixed and shouldn't be happening
from v3.2 onwards.
Do you still see the issue in older versions?
On Mon, 2012-01-23 at 21:20 -0800, Gabe Black wrote:
Sorry, forgot to add a subject.
Gabe
On Mon, Jan 23, 2012 at 9:18 PM, Gabe Black gabebl...@google.com
The last one is an RFC patch:
I think it is better to refactor the rmap things, if needed, before
other architectures than x86 starts large pages support.
Takuya
arch/ia64/kvm/kvm-ia64.c|8
arch/powerpc/kvm/book3s_64_mmu_hv.c |6 +++---
We want to eliminate direct access to the rmap array.
Signed-off-by: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp
---
arch/x86/kvm/mmu_audit.c |4 +---
1 files changed, 1 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kvm/mmu_audit.c b/arch/x86/kvm/mmu_audit.c
index 6eabae3..e62fa4f
We can hide the implementation details and treat every level uniformly.
Signed-off-by: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp
---
arch/x86/kvm/mmu.c | 12 ++--
1 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
index
Though we have one rmap array for every level, those for large pages,
called rmap_pde, are coupled with write_count information and constitute
lpage_info arrays.
To hide this implementation details, we are now using __gfn_to_rmap()
which includes likely(level == PT_PAGE_TABLE_LEVEL) heuristics;
On Thu, Jan 19, 2012 at 10:22:41PM -0500, Christoffer Dall wrote:
The kvm_vcpu_kick function performs roughly the same funcitonality on
most all architectures, so we shouldn't have separate copies.
PowerPC keeps a pointer to interchanging waitqueues on the vcpu_arch
structure and to
On Mon, Jan 23, 2012 at 07:42:04PM +0900, Takuya Yoshikawa wrote:
The last one is an RFC patch:
I think it is better to refactor the rmap things, if needed, before
other architectures than x86 starts large pages support.
Takuya
Looks good to me.
--
To unsubscribe from this list:
52 matches
Mail list logo